CVE-2022-49427

Source
https://cve.org/CVERecord?id=CVE-2022-49427
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49427.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49427
Downstream
Related
Published
2025-02-26T02:12:47.692Z
Modified
2026-03-12T03:25:10.143804Z
Summary
iommu/mediatek: Remove clk_disable in mtk_iommu_remove
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: Remove clkdisable in mtkiommu_remove

After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the iommu clock is controlled by the runtime callback. thus remove the clk control in the mtkiommuremove.

Otherwise, it will warning like:

echo 14018000.iommu > /sys/bus/platform/drivers/mtk-iommu/unbind

[ 51.413044] ------------[ cut here ]------------ [ 51.413648] vpp0smiiommu already disabled [ 51.414233] WARNING: CPU: 2 PID: 157 at */v5.15-rc1/kernel/mediatek/ drivers/clk/clk.c:952 clkcoredisable+0xb0/0xb8 [ 51.417174] Hardware name: MT8195V/C(ENG) (DT) [ 51.418635] pc : clkcoredisable+0xb0/0xb8 [ 51.419177] lr : clkcoredisable+0xb0/0xb8 ... [ 51.429375] Call trace: [ 51.429694] clkcoredisable+0xb0/0xb8 [ 51.430193] clkcoredisablelock+0x24/0x40 [ 51.430745] clkdisable+0x20/0x30 [ 51.431189] mtkiommuremove+0x58/0x118 [ 51.431705] platformremove+0x28/0x60 [ 51.432197] devicereleasedriverinternal+0x110/0x1f0 [ 51.432873] devicedriverdetach+0x18/0x28 [ 51.433418] unbindstore+0xd4/0x108 [ 51.433886] drvattrstore+0x24/0x38 [ 51.434363] sysfskfwrite+0x40/0x58 [ 51.434843] kernfsfopwriteiter+0x164/0x1e0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49427.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b34ea31fe013569d42b7e8681ef3f717f77c5b72
Fixed
053465ab20dcd324a43a1811ee98e5721e6a3e65
Fixed
9b3bd97acb4f8954b8a43a5d63ed9050d463b4e1
Fixed
6eaa046c696c83542c56765cdde564d9818ff1fb
Fixed
98df772bdd1c4ce717a26289efea15cbbe4b64ed
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49427.json"